Tag Archives: World Wide Web

Commission consults on ‘Internet of Things’

Communications Highway, internet security, ip address, electronic data interchange

A new EU consultation announced today is looking to balance the benefits of using smart chips in everyday objects such as phones, cars, household appliances, clothes and even food whilst making sure that the way they gather, process and store information is properly controlled. The “Internet of Things” (IoT) is a future in which everyday [...]

Ofcom publishes latest telecoms complaints data

Ofcom today published its latest complaints data revealing the most complained about major telecoms providers between October and December 2011.Ofcom today published its latest complaints data revealing the most complained about major telecoms providers between October and December 2011.
The quarterly report aims to provide useful information for consumers, and also to incentivise telecoms providers to…

Defamation Act 1996

stop now order, UK Legislation, Patent Act 1977, united kingdom cyber laws

The use of online chat rooms, forums and groups is a risky activity and fertile ground for litigation based on defamation laws. Unlike other materials published online, website owners don’t have full control over discussion threads. The Defamation Act 1996 sets out the current defamation regime, although the Act is under review. The Act amends the laws of [...]

IT Contract: Connectivity Contracts

connectivity

Organisations connect to the Internet using an ISP (Internet service provider). The robustness and speed of connectivity can both vary geographically depending upon the availability of broadband. Generally-speaking towns and cities have been quick to build a communications infrastructure but rural areas are now benefiting from broadband investment, especially from the UK and EU. Use [...]

Internet Security for the Workplace

globe padlocks, web security, network and information security directive, mobile data compliance, cyber crime

Where employees are permitted to use the Internet, the organisation must adopt appropriate policies and procedures to deal with the associated security risks which can cause the organisation damage and cost in downtime, wasted resources, data loss and intellectual property loss. Internet and computing resources should be made available only to authorised workers who require them [...]